skip to main content
10.1145/2908446.2908508acmotherconferencesArticle/Chapter ViewAbstractPublication PagesinfosConference Proceedingsconference-collections
research-article

An Arnold Cat Map-Based Chaotic Approach for Securing Voice Communication

Published: 09 May 2016 Publication History

Abstract

We present four encryption approaches for voice communication systems by combining Arnold cat map with either Henon or modified Henon or Unified or Lorenz chaotic maps. These approaches depend on permuting and substituting voice samples using transform domains and secret keys in time. We use two levels of chaotic maps to increase the security of the encrypted signal. We first apply Arnold cat map to permute the voice samples, then we apply either Henon or modified Henon or Unified or Lorenz chaotic maps to generate the mask key and hence substitute the permuted samples. We also present a comparative study between these approaches. Experimental results show that modifying conventional chaotic approaches from one level chaotic map to two levels chaotic map increases the key space of the encryption system.

References

[1]
E.Mosa, O.Zahran," Chaotic Encryption of Speech Signals in Transform Domains" Computer Engineering & Systems, 2009. ICCES 2009. International Conference, PP. 300 - 305 (Dec. 2009).
[2]
Sattar B. Sadkhan, Rana Saad Mohammed" Proposed random unified chaotic map as PRBG for voice encryption in wireless communication" International Conference on Communication, Management and Information Technology (ICCMIT),Vol. 65, pp. 314--323 (2015).
[3]
Saad Najim Al Saad, Eman Hato "A Speech Encryption on Chaotic Maps" International Journal of Computer Application (0975-8887), volume 93-No 4, PP. 19--28 (May, 2014).

Cited By

View all
  • (2023)T-AES- and ECC-Based Secure Data Communication in Peer-to-Peer Networks5th International Conference on Wireless, Intelligent and Distributed Environment for Communication10.1007/978-3-031-33242-5_4(43-58)Online publication date: 15-May-2023
  • (2023)A Lightweight Image Cryptosystem for Multimedia Internet of ThingsIntelligent Cyber Physical Systems and Internet of Things10.1007/978-3-031-18497-0_29(375-391)Online publication date: 4-Feb-2023
  • (2022)A retrieval method for encrypted speech based on improved power normalized cepstrum coefficients and perceptual hashingMultimedia Tools and Applications10.1007/s11042-022-12560-581:11(15127-15151)Online publication date: 27-Feb-2022
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
INFOS '16: Proceedings of the 10th International Conference on Informatics and Systems
May 2016
347 pages
ISBN:9781450340625
DOI:10.1145/2908446
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 09 May 2016

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Arnold cat map
  2. Henon map
  3. Lorenz map
  4. Permutation
  5. Substitution
  6. Unified map
  7. Voice encryption

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

INFOS '16

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)8
  • Downloads (Last 6 weeks)0
Reflects downloads up to 20 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2023)T-AES- and ECC-Based Secure Data Communication in Peer-to-Peer Networks5th International Conference on Wireless, Intelligent and Distributed Environment for Communication10.1007/978-3-031-33242-5_4(43-58)Online publication date: 15-May-2023
  • (2023)A Lightweight Image Cryptosystem for Multimedia Internet of ThingsIntelligent Cyber Physical Systems and Internet of Things10.1007/978-3-031-18497-0_29(375-391)Online publication date: 4-Feb-2023
  • (2022)A retrieval method for encrypted speech based on improved power normalized cepstrum coefficients and perceptual hashingMultimedia Tools and Applications10.1007/s11042-022-12560-581:11(15127-15151)Online publication date: 27-Feb-2022
  • (2021)Chaos-Based Image Encryption Using Arnold’s Cat Map Confusion and Henon Map DiffusionAdvances in Science, Technology and Engineering Systems Journal10.25046/aj0601366:1(316-326)Online publication date: Jan-2021
  • (2021)Text Encryption using Bi-Amold Cat Map and Modulus Operation2021 International Seminar on Application for Technology of Information and Communication (iSemantic)10.1109/iSemantic52711.2021.9573175(102-106)Online publication date: 18-Sep-2021
  • (2021)Two-level chaotic system versus non-autonomous modulation in the context of chaotic voice encryption2021 International Telecommunications Conference (ITC-Egypt)10.1109/ITC-Egypt52936.2021.9513947(1-6)Online publication date: 13-Jul-2021

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media